567 research outputs found

    Cross-layer architecture for a satellite-Wi-Fi efficient handover

    Get PDF
    To achieve fully mobile communications, considering different environments and modern service requirements, a multiple-segment architecture is the most suitable to guarantee service continuity with acceptable performance. Handover (HO) procedures can be invoked either out of necessity (if the current network connection is going off) or to improve performance (if different bandwidth or quality of service is required). In this scenario, to provide uninterrupted communication services, efficient intersegment HO capability must be implemented. The architecture considered includes a satellite segment and a number of Wi-Fi hot spots. A mobile node (MN) can switch from a segment to other exploiting services of mobile Internet protocol (MIP). This architecture introduces great flexibility and ensures capillary coverage; it also strongly affects Transmission Control Protocol (TCP)-based application performance. To efficiently face HO consequences, particularly when the TCP runs as a transport protocol, an innovative protocol architecture based on cross-layer (CL) exchange of information is proposed. Analyses of TCP dynamics during HOs and the performance improvement introduced with the proposed CL architecture, evaluated through the network simulator Ns-2, are presented

    Network layer security: Design for a cross layer architecture

    Get PDF
    Traditional modular layering schemes have served a major part in the development of a variety of protocols. However, as the physical layer impairments become more unpredictable, a cross layer design (CLD) which is dynamic in nature provides better performance. CLD introduces new challenges in protocol design as well as in the area of security. Using numerical analysis, we show that a link layer design employing header compression and cross layer signalling to protect protocol headers can limit packet discarding. This paper also reviews the IPsec protocol and describes how IPsec can be modified for cross layer architecture. © 2007 IEEE

    CAC-TCP cross-layer interaction in a HAPS-satellite integrated scenario

    Get PDF
    The integration of a satellite system with a HAPS segment appears very suitable to provide communication services, including Internet access, for a large set of applications. In fact, the-satellite capability to provide wide coverage and broadband access can be enhanced by the use of cost-effective, mobile/portable and low-power consuming user terminals, when HAPS acts as an intermediate repeater. Moreover, also TCP-based applications, which suffer from long latency introduced by the satellite link and in general by errors, can get benefits in terms of end-to-end performance. In this frame, this paper deals with the introduction, on board the HAPS, of an efficient CAC scheme in order to guarantee an optimal utilization of the precious radio resources. In particular, we propose an innovative TCP driven CAC algorithm, which shall take into account not only the QoS requirements, but also TCP statistics obtained through a proxy installed on the HAPS. Results show that the overall system performance in terms of both average throughput and blocking probability is significantly improved

    A cross-layer architecture for satellite network security: CL-IPsec

    Get PDF
    Cross-layer architectures (CLAs) are proposed to improve performance in networks where physical layer impairments are unpredictable and provision of security services may be challenging, as in satellite networks. This paper proposes an extension to the IPsec protocol, named Cross-Layer IPsec (CL-IPsec), able to provide authentication and integrity services through a cross-layer architecture when the adopted protocol is UDP-Lite. This is suitable for multicast applications that are cost-effectively provided by satellite systems. A satellite emulation platform has been used to validate the CL-IPsec implementation and to evaluate the performance improvement derived from the proposed CLA. © 2008 IEEE

    Neuromuscular magnetic stimulation counteracts muscle decline in ALS patients: results of a randomized, double-blind, controlled study

    Get PDF
    The aim of the study was to verify whether neuromuscular magnetic stimulation (NMMS) improves muscle function in spinal-onset amyotrophic lateral sclerosis (ALS) patients. Twenty-two ALS patients were randomized in two groups to receive, daily for two weeks, NMMS in right or left arm (referred to as real-NMMS, rNMMS), and sham NMMS (sNMMS) in the opposite arm. All the patients underwent a median nerve conduction (compound muscle action potential, CMAP) study and a clinical examination that included a handgrip strength test and an evaluation of upper limb muscle strength by means of the Medical Research Council Muscle Scale (MRC). Muscle biopsy was then performed bilaterally on the flexor carpi radialis muscle to monitor morpho-functional parameters and molecular changes. Patients and physicians who performed examinations were blinded to the side of real intervention. The primary outcome was the change in the muscle strength in upper arms. The secondary outcomes were the change from baseline in the CMAP amplitudes, in the nicotinic ACh currents, in the expression levels of a selected panel of genes involved in muscle growth and atrophy, and in histomorphometric parameters of ALS muscle fibers. The Repeated Measures (RM) ANOVA with a Greenhouse-Geisser correction (sphericity not assumed) showed a significant effect [F(3, 63) = 5.907, p < 0.01] of rNMMS on MRC scale at the flexor carpi radialis muscle, thus demonstrating that the rNMMS significantly improves muscle strength in flexor muscles in the forearm. Secondary outcomes showed that the improvement observed in rNMMS-treated muscles was associated to counteracting muscle atrophy, down-modulating the proteolysis, and increasing the efficacy of nicotinic ACh receptors (AChRs). We did not observe any significant difference in pre- and post-stimulation CMAP amplitudes, evoked by median nerve stimulation. This suggests that the improvement in muscle strength observed in the stimulated arm is unlikely related to reinnervation. The real and sham treatments were well tolerated without evident side effects. Although promising, this is a proof of concept study, without an immediate clinical translation, that requires further clinical validation

    Performance evaluation of TCP-based applications over DVB-RCS DAMA schemes

    Get PDF
    Transmission Control Protocol (TCP) performance over Digital Video Broadcasting-Return Channel via Satellite (DVB-RCS) standard is greatly affected by the total delay, which is mainly clue to two components, propagation delay and access delay. Both are significant because they are dependent oil the long propagation path of the satellite link. I-lie former is intrinsic and due to radio wave propagation over the satellite channel for both TCP packets and acknowledgements. It is regulated by the control loop that governs TCP. The latter is due to the control loop that governs the demand assignment Multiple access (DAMA) signalling exchange between satellite terminals and the network control center. necessary to manage return link resources. DAMA is adopted in DVB-RCS standard to achieve flexible and efficient use of the shared resources. Therefore, performance of TCP over DVB-RCS may degrade due to the exploitation of two nested control loops also depending oil both file selected DAMA algorithm and the traffic profile. This paper analyses the impact of basic DAMA implementation oil TCP-based applications over a DVB-RCS link for a large Set Of study Cases. To provide a detailed overview of TCP performance in DVB-RCS environment, the analysis includes both theoretical approach and simulation campaign. Copyright (C) 2009 John Wiley & Sons, Ltd

    End-to-end network requirements for 3GPP Voice over Wi-Fi (VoWiFi) service

    Get PDF
    4G mobile networks were the first to allow packet-switched voice calls, supported by an optional IP-based infrastructure called IP Multimedia Subsystem (IMS). These are part of the Voice over Long Term Evolution (VoLTE) service, called afterwards Voice over New Radio (VoNR) in 5G. In parallel, 3GPP defined the possibility of user terminals accessing either a 4G Evolved Packet Core (EPC) or a 5G Core (5GC) Network also via non-3GPP access. Non-3GPP access represents an alternative to the use of 4G/5G licensed frequencies of the MNO, leveraging Internet connectivity of an Internet Service Provider (ISP) to perform the same IP-based 4G/5G services, and in particular VoLTE/VoNR. Even though, especially for untrusted non-3GPP access, any IP-based access technology is applicable, the initial reference is Wi-Fi access, which is in practice available in all Smartphones. Consequently, the new 3GPP Voice over Wi-Fi (VoWiFi) service was introduced, also called commercially Wi-Fi Calling. VoWiFi is then subject to network conditions not fully under control of the Mobile Network Operator (MNO), not only related just to the Wi-Fi access but to the whole end-to-end data path across shared networks and the Internet. In this article, the VoWiFi technology and protocols are presented in detail, through a review of 3GPP specifications and by performing real calls using a national LTE MNO and a Xiaomi smartphone. The aim of the article is presenting the application traffic pattern and assessing the network conditions under which VoWiFi calls have good quality. These results are useful to define end-to-end Network requirements for assuring a satisfactory VoWiFi service to end users

    A inclusão dos alunos com deficiência no contexto escolar

    Get PDF
    Orientadora : Tainá Ribas MéloMonografia (especialização) - Universidade Federal do Paraná, Setor Litoral, Curso de Especialização em Especialista em Gênero e Diversidade na EscolaInclui referênciasResumo : O presente artigo tem como problemática de investigação verificar se uma determinada escola inserida no município de Itajaí realiza a inclusão dos/as alunos/as com deficiência no contexto dos primeiros anos do ensino fundamental. O objetivo é investigar o processo de inclusão partindo das questões relativas à acessibilidade oferecida aos/as alunos/as com deficiência bem como o processo de ensino aprendizagem a que fazem parte. A metodologia do estudo é de caráter quali- quantitativo sendo a investigação realizada através de observações das atividades escolares e da aplicação de questionário às professoras e agentes de apoio em educação especial. O trabalho teve apoio de autores como Mantoan (1997), Manzini (2004), a Lei de Diretrizes e Bases (1996), os marcos político–legais da Educação Especial (2010) entre outros. A partir destes estudos e o resultado da pesquisa pode-se concluir que no contexto da escola pesquisada a inclusão dos alunos/as com deficiência é uma meta a ser alcançada principalmente no que diz respeito à acessibilidade no entorno e no ambiente escolar, nas práticas pedagógicas adotadas pelos docentes e nas atividades dirigidas em espaços de uso comum. Para isso propostas de ações serão sugeridas partindo dos momentos de formação continuada, à sistematização, implementação e adaptação dos recursos pedagógicos no contexto educacional bem como a parceria com professores/as e agentes de apoio em educação especial na busca de um sistema educacional inclusiv

    A TCP Driven CAC scheme: efficient resource utilization in a leaky HAP-satellite integrated scenario

    Get PDF
    An integrated high altitude platform (HAP)-satellite communication system appears to be very suitable for a large set of scenarios including emergency situations, exceptional events, etc. In fact, the satellite capability to provide a broadband and ubiquitous access can be enhanced by the deployment of HAP that allows the use of low-power consuming, cost-efficient, and portable terminals. To obtain an optimum utilization of radio resource, without renouncing to QoS satisfaction, a suitable call admission control scheme must be implemented. Nevertheless, transmission control protocol (TCP) behavior, mainly affected by the high latency and shadowing events, can impact call admission control (CAC) performance. Therefore, it would be desirable that the CAC scheme takes into account also the TCP congestion window real evolution. We present an innovative CAC scheme that uses TCP statistics as one of its inputs and is able to manage different classes of users. Results show that CAC performance is significantly improved by introducing TCP statistics about network congestion as an input parameter
    corecore